12.07.2015 Views

Security and Audit of UNIX/Linux - MIS Training

Security and Audit of UNIX/Linux - MIS Training

Security and Audit of UNIX/Linux - MIS Training

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

International Leader in <strong>Audit</strong> <strong>Training</strong>SAVE UP TO 50%WITH IN HOUSETRAININGDetails inside18th - 20th November 2008, London<strong>Security</strong> <strong>and</strong><strong>Audit</strong> <strong>of</strong><strong>UNIX</strong>/<strong>Linux</strong>All the Knowledge You Need to Get toGrips with <strong>UNIX</strong> <strong>and</strong> <strong>Linux</strong> SystemsCourse DirectorSteve RimellLearn how <strong>UNIX</strong> systems are configured <strong>and</strong> securedExplore the different versions <strong>of</strong> <strong>UNIX</strong> currently in useDiscover how to control <strong>UNIX</strong>’s greatest risk areasGain a greater underst<strong>and</strong>ing <strong>of</strong> how <strong>UNIX</strong> systems can operate securely<strong>and</strong> reliably in a Windows environmentDeepen your knowledge <strong>of</strong> how to plan <strong>and</strong> conduct an audit <strong>of</strong> both the<strong>UNIX</strong> <strong>and</strong> <strong>Linux</strong> strategic operating systems<strong>MIS</strong> past delegates include...ABN AMRO, Alliance & Leicester, Barclays, BT, Canon, Deutsche Bank, Goldman Sachs, HSBC,JP Morgan Chase, National <strong>Audit</strong> Office, Reuters, Vodafone, Sony, UBSWell structured<strong>and</strong> very usefulfor my jobLegal & GeneralA fantastic guidedtour through theworld <strong>of</strong> securing<strong>UNIX</strong>JP Morgan ChaseEARN22 CPE CREDITSWeb mistieurope.comEmail mis@mistieurope.com


<strong>Security</strong> <strong>and</strong><strong>Audit</strong> <strong>of</strong><strong>UNIX</strong>/<strong>Linux</strong>All the Knowledge You Need toGet to Grips with <strong>UNIX</strong> <strong>and</strong><strong>Linux</strong> Systems18th - 20th November 2008, LondonSeminar Focus & FeaturesThe <strong>UNIX</strong> operating system has been around since the 1970s<strong>and</strong> has had a reputation for being both insecure <strong>and</strong> at thesame time difficult to use. This isn’t entirely true – a <strong>UNIX</strong>system is as secure as any other operating system if properlyconfigured. In this practical three-day workshop you’ll haveh<strong>and</strong>s-on administrator level access to <strong>UNIX</strong> systems, so youcan see for yourself how they are configured <strong>and</strong> secured. You’lllearn about the main versions <strong>of</strong> <strong>UNIX</strong> in current use – SunSolaris <strong>and</strong> IBM’s AIX. You’ll also learn about <strong>Linux</strong> – the opensource operating system that has produced so many headlinesin the IT press over the last few years.The course will provide you with a detailed walk-though <strong>of</strong> <strong>UNIX</strong>security <strong>and</strong> administration tools, illustrating the main areas <strong>of</strong>risk <strong>and</strong> how they can be controlled by correct systemconfiguration <strong>and</strong> monitoring. You’ll learn how the varioussystem suppliers like Sun, IBM <strong>and</strong> the <strong>Linux</strong> vendors haveimplemented their own versions <strong>of</strong> file system security,user/group control <strong>and</strong> logging. <strong>UNIX</strong> usually has to co-existwith Windows systems in a corporate network, so you will learnhow this is achieved <strong>and</strong> how <strong>UNIX</strong> systems can be set up tooperate securely <strong>and</strong> reliably in a Windows environment. At theend <strong>of</strong> the course, you will have a thorough underst<strong>and</strong>ing <strong>of</strong><strong>UNIX</strong> <strong>and</strong> <strong>Linux</strong> <strong>and</strong> be able to plan <strong>and</strong> conduct an audit <strong>of</strong>these strategic operating systems. As well as a detailed coursemanual, we’ll provide you with an audit programme covering allthe main <strong>UNIX</strong> versions.Course Director Steve RimellSteve Rimell has an enviable reputation as the most respectedauthority in the UK with over 20 years practical experience ininformation systems audit. He provides training, security reviews,consulting services, <strong>and</strong> internal audit support for a wide range <strong>of</strong>public <strong>and</strong> private sector clients in the UK, Europe <strong>and</strong> many othercountries. He has also had extensive experience as an audit managerrunning a commercial IS audit service. Steve specialises in the moretechnical aspects <strong>of</strong> information systems audit, having extensiveknowledge <strong>of</strong> the security <strong>and</strong> control <strong>of</strong> <strong>UNIX</strong>, Oracle, WindowsNT/2000, <strong>and</strong> networking environments such as TCP/IP. He haspresented h<strong>and</strong>s-on training courses in this subject for Systems<strong>Security</strong>’s Bristol training centre since 1996, where he proves to thestudents that apparently highly technical areas are not as hard toaudit as they appear. Steve is a member <strong>of</strong> CIPFA <strong>and</strong> the Institute <strong>of</strong>Internal <strong>Audit</strong>ors. He has delivered public <strong>and</strong> in-house trainingpresentations for System <strong>Security</strong>, <strong>MIS</strong> <strong>Training</strong> <strong>and</strong> many otherclients. He is regularly invited to speak at pr<strong>of</strong>essional meetings <strong>and</strong>conferences in the UK <strong>and</strong> overseas, <strong>and</strong> is presently engaged in avariety <strong>of</strong> projects to develop audit automation s<strong>of</strong>tware for network<strong>and</strong> operating system security testing. Steve is also the owner <strong>and</strong>proprietor <strong>of</strong> Rimell Associates Ltd.


Who Should AttendInformation <strong>Security</strong> Managers <strong>and</strong> Analysts; Web, LAN <strong>and</strong> NetworkAdministrators; Information Technology Planners <strong>and</strong> Strategists;Application Developers; <strong>and</strong> IT <strong>Audit</strong>ors.Prerequisite<strong>Security</strong> <strong>and</strong> <strong>Audit</strong> <strong>of</strong> TCP/IP Networks, or equivalent knowledge <strong>of</strong>TCP/IP <strong>and</strong> general network operating concepts <strong>and</strong> security. It is alsohelpful if you are familiar with either Windows or a Unix-basedoperating system.Day One<strong>UNIX</strong> Versions• AIX• Solaris• <strong>Linux</strong> versionsOperating System Processes SystemStartup Files• The <strong>UNIX</strong> boot process• Run levels• Run level control filesThe <strong>UNIX</strong> File System• Disks <strong>and</strong> file systems• The <strong>UNIX</strong> file system st<strong>and</strong>ard• The main directories• File <strong>and</strong> directory permissions• Modes <strong>of</strong> operation• Access control listsDay Two<strong>UNIX</strong> Logon Controls• Default login settings• ‘Per user’ login controls• User login filesUser <strong>and</strong> Group Management• Group definition files• Group membership <strong>and</strong> how it affects security UnixNetworking• <strong>UNIX</strong> <strong>and</strong> TCP/IP• Network configuration files• Remote comm<strong>and</strong>s – rsh, rcp, rlogin• The network service control files<strong>UNIX</strong> Graphical Interfaces –The X Window SystemDay Three<strong>UNIX</strong> <strong>and</strong> Windows• Samba• Windows X ServersPractical Steps to the <strong>Audit</strong><strong>of</strong> a <strong>UNIX</strong> System• Where to start• Listing users <strong>and</strong> groups• Using built-in <strong>UNIX</strong> administration comm<strong>and</strong>s• Shell scripting for auditors• Key files to inspect• Change management• System-specific tools for different <strong>UNIX</strong> versions• Commercial s<strong>of</strong>tware• Free s<strong>of</strong>tware toolsLearning levelAdvancedFeeGBP £1,895• Automated vulnerability checkersEARN22 CPE CREDITSIn-House <strong>Training</strong>Save Up To 50% When You Run Thiscourse In-houseIn-house tailored training will enableyou & your colleagues to makesignificant savings as we charge perday & not per participant so the costremains the same regardless <strong>of</strong> howmany people attend. We can <strong>of</strong>ferany <strong>of</strong> our public courses or tailorthem to your requirements. <strong>Training</strong>is available in all areas <strong>of</strong> Internal<strong>Audit</strong>, IT <strong>Audit</strong>, <strong>and</strong> IT <strong>Security</strong>If you have 6 or more colleagueswho would be interested in one <strong>of</strong>our courses <strong>and</strong> you would like tomake significant savings, contact usnow;• What are your training objectives?• How many people require thetraining?• When would you like to run thetraining?• What level <strong>of</strong> experience do you<strong>and</strong> your colleagues have?• We will then email you a detailedproposal which addresses yourunique needs.You will have complete control <strong>of</strong> thetraining content <strong>and</strong> decide when it isrun. We guarantee that we will beable to cater for all your businessneeds.Email Guy Cooper atgcooper@mistieurope.comor call+44 (0) 20 7779 8975More Great Reasons to Choose ourIn-house <strong>Training</strong>:• Save money over public seminarfees• Save money on travel &accommodation• Save time on travel as theinstructor will travel to you.Furthermore, the training can beheld at the most convenient timefor you.• Tailor the course content; ensurethe relevance <strong>of</strong> the seminar foryour colleagues. You can tailor thestructure & methodology <strong>of</strong> yourseminar or customise the seminarto meet the expertise levels <strong>of</strong> theparticipants.• Bring the best in the business;Instructors are h<strong>and</strong>s-on, expertpractitioners who are your subjectmatter consultants when they arenot training.• Gain CPE points & certificates forthe number <strong>of</strong> training hours.


<strong>Security</strong> <strong>and</strong> <strong>Audit</strong> <strong>of</strong> <strong>UNIX</strong>/<strong>Linux</strong>All the Knowledge You Need to Get to Grips with <strong>UNIX</strong> <strong>and</strong> <strong>Linux</strong> SystemsKey topic areasWhen registering for this event please quote reference WEB• Learn how <strong>UNIX</strong> systems are configured <strong>and</strong> secured• Explore the different versions <strong>of</strong> <strong>UNIX</strong> currently in use• Discover how to control <strong>UNIX</strong>’s greatest risk areas• Gain a greater underst<strong>and</strong>ing <strong>of</strong> how <strong>UNIX</strong> systems can operatesecurely <strong>and</strong> reliably in a Windows environment• Deepen your knowledge <strong>of</strong> how to plan <strong>and</strong> conduct an audit <strong>of</strong> boththe <strong>UNIX</strong> <strong>and</strong> <strong>Linux</strong> strategic operating systemsWhy should you attend?• <strong>MIS</strong> <strong>Training</strong> is the global leader in IT audit <strong>and</strong> info security training,having trained over 200,000 delegates• Course Instructors are the most reputable in the industry• We have an impressive client list including , Barclays, BT, Canon,Deutsche Bank, HSBC to name a few• Earn CPE points - which can be used to qualify/maintain a CISSP, CISAor CISM18th - 20th November 2008, LondonPLEASE SEND ME INFORMATION ABOUT RUNNING THIS COURSE IN-HOUSE <strong>Security</strong> <strong>and</strong> <strong>Audit</strong> <strong>of</strong> <strong>UNIX</strong>/<strong>Linux</strong>(please photocopy form for additional delegates) 18th - 20th November 2008, London (MT2505)GBP £1,895 £+ VAT @ 17.5% £Gr<strong>and</strong> Total £Payment InformationYou can now pay online at www.mistieurope.com Cheque enclosed (payable to <strong>MIS</strong> <strong>Training</strong>)Registration Information*Discounts: Please call to enquireabout corporate discounts.Discounts can not be used inconjunction with each other. Please invoice my company PO#Please debit my credit card AMEX VISA MasterCardCard NumberCardholders namePlease include billing address if different from address givenExpiryVerification CodePlease note that in completing this booking you undertake to adhere to thecancellation <strong>and</strong> payment terms listed belowSignatureDateApproving ManagerPosition5 easy ways to registerTel: +44 (0)20 7779 8944Fax completed form to: +44 (0)20 7779 8293Email: mis@mistieurope.com Web: www.mistieurope.comPost completed form to: Carlos Doughty, <strong>MIS</strong> <strong>Training</strong>, Nestor House,Playhouse Yard, London EC4V 5EX UKCustomer InformationTitle First name SurnameTitle/PositionOrganisationE-Mail Address (Required)AddressCountryPostcodeTelephoneFaxVAT Number (If you have one)The information you provide will be safeguarded by the Euromoney Institutional Investor PLCgroup whose subsidiaries may use it to keep you informed <strong>of</strong> relevant products <strong>and</strong> services.We occasionally allow reputable companies outside the Euromoney Institutional Investor PLCgroup to contact you with details <strong>of</strong> products that may be <strong>of</strong> interest to you. As an internationalgroup we may transfer your data on a global basis for the purposes indicated above. If youobject to contact by telephone fax or email please tick the relevant box. If you do notwant us to share your information with other reputable companies please tick this box Please send me information on In House <strong>Training</strong> <strong>Audit</strong>ing Business Applications, 8th - 10th September 2008, London Securing <strong>and</strong> <strong>Audit</strong>ing Windows 2003, 9th - 12th September 2008, London Preparing for the CISA Examination, 3rd - 7th November 2008 London(fees must be paid in advance <strong>of</strong> the event)Accommodation: The course will be held in a Radisson Edwardian hotel in Central London (zone 1). To get the best available rate at Radisson Edwardian hotels in Londonplease visit www.radissonedwardian.com/mis or, alternatively contact the hotel direct <strong>and</strong> quote the <strong>MIS</strong> event title <strong>and</strong> dates when making your booking.Cancellation Policy: Should a delegate be unable to attend, a substitute may attend in his or her place. Cancellations received within 21 working days <strong>of</strong> the event are liablefor the full seminar fee. If full payment has been received you are eligible for a 75% reduction on the next run <strong>of</strong> the seminar. This discount will be valid for one year only. <strong>MIS</strong>reserves the right to change or cancel programmes due to unforeseen circumstances.VAT: All delegates attending are liable to pay VAT. After the event organisations registered for VAT in the UK may reclaim the tax.Delegates from outside the UK but within the European Community may also be able to reclaim the VAT. Organisations outsidethe UK should check with their excise authority as to which domestic fiscal regulations apply. High Yield/No-RiskEARN22 CPE CREDITSWeb mistieurope.comEmail mis@mistieurope.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!